Fig. 1—Hillary Clinton has all of our encryption keys, including the FBI's. "Encryption keys" is a general reference to several encryption functions hijacked by Hillary and her surrogate ENTRUST. They include hash functions (used to indicate whether the contents have been altered in transit), PKI public/private key infrastructure, SSL (secure socket layer), TLS (transport layer security), the Dual_EC_DRBG NSA algorithm (Dual Eliptical Curve Deterministic Random Bit Generator) and certificate authorities. The convoluted structure managed by the gutless agency chief information officer "Federal Common Policy" group says it has "hundreds" of certificate authorities, but this is a material lie. They have ceded "Root" authority (the basis of the X.509-based public key infrastructure) to key companies like ENTRUST INC, including the ability to sublicense their authority to third parties who in turn manage entire other networks (cross-certificates, subordinate certificates, Bridge certificate authorities) in a Gordian knot of incestuous commercial relationships clearly designed to fool the public to hide their devilish criminality. All roads lead back to Hillary and the Rose Law Firm.

Click here to read a list of just some of the "more than 2000 organizations in 60 different countries" for which Hillary has backdoor encrytion keys. Source: ENTRUST 10-K Annual Reports (1998-2009). SEC Edgar. Annual reports from 1998 to 2009 and selected other filings.

Deciphering Hillary's encryption Keys that have kept her one step ahead of the sheriff

SPECIAL NOTICE: This post is a work in progress. You are encouraged to return to pick up additional evidence as it is added. Indictable evidence continues to pour in for use by prosecutors, alternative media, Treasury, U.S. Marshalls and military tribunals. These criminals have relied on the fact that encryption, cryptography and cryptanalysis is a field of esoteric mathematics for which the average person has little interest. Hopefully, that will now change.

Cryptography—the use of codes and ciphers to protect secrets—began thousands of years ago. Until recent decades, it has been the story of what might be called classic cryptography — that is, of methods of encryption that use pen and paper, or perhaps simple mechanical aids. In the early 20th century, the invention of complex mechanical and electromechanical machines, such as the Enigma rotor machine, provided more sophisticated and efficient means of encryption; and the subsequent introduction of electronics and computing has allowed elaborate schemes of still greater complexity, most of which are entirely unsuited to pen and paper.

In a simple form, simply scrambling the letters in a word is a basic form of cryptography. HELLO might become OLHEL or LEHLO. In more sophisticated approaches, look up tables contain readable words in the first column and a replacement word in the second. The resulting message looks like jibberish until the look up table is used by the recipient. The public key infrastructure and certificate authorities discussed in this post are simply more scrambled forms of encryption.

The earliest example known was from an Egyptian scribe about 1900 BC. Assyrian merchants used a form of encryption called intaglio in 1500 BC. Hebrew scribes wrote a copy of the Book of Jeremiah in a substitution cipher in 605 BC. In 487 BC the Greeks used a "skytale" to encrypt important messages. Julius Caesar (100-44 BC) encrypted government communications. Abu ' Abd al-Rahman al-Khalil ibn Ahmad ibn Amr ibn Tammam al Farahidi al-Zadi al Yahmadi wrote a book on cryptography in 725-790 AD. Thomas Jefferson invented a wheel cipher. Tellingly, a design in 1976 by IBM based on "the Lucifer cipher" is now used and called "triple-DES" (the Triple Data Encryption Algorithm).

When the German Enigma Machine was cracked in World War II, the Allies could read ALL German communications from that point forward. In the same way, Hillary's access to the PKI, Dual_EC_DRBG algorithm and Certificate Authorities gives her access to The Internet of Things' version of the Enigma Machine break, which was considered by western Supreme Allied Commander Dwight D. Eisenhower to have been "decisive" to the Allied victory. SeeHistory of Encryption.

(Sep. 16, 2018)—Imagine that your identity is stolen suddenly.

Your healthcare, education, police, employment and bank records are all altered overnight to make you look like an embezzler. Imagine you are jolted awake the following morning by the police bashing in your door to arrest you. Imagine that the local TV is already carrying news of your arrest using a drunken party photo of you off your phone.

Imagine further that you are Hillary Clinton. You need for 55,000 Clinton Foundation emails on FBI director James Comey computer to disappear. Poof. They’re wiped without a trace.

Imagine still further that you are Lord Mark Malloch-Brown from the Queen’s Privy Council. You need to erase the U.S. Department of Treasury’s new evidence of foreign meddling embedded in your Smartmatic voting machines. Your bunk buddy George Soros makes a call to Hillary. Poof. This evidence is digitally wiped, without a trace.

This cannot happen in America you say? Think again.

Since these people have full backdoor access to any computer or phone on the Internet, can they ever be caught? Yes, once we realize how they do it. That method has just been discovered.

Truth is, Hillary Clinton literally has access to every computer on the Internet through a company named ENTRUST. Her 19-year Rose Law Firm partner Jerry C. Jones directs the company (now ostensibly run by a Silicon Valley dude named Orlando Bravo and his private equity firm Thoma Bravo, LLC), and has done since Dec. 2003. Entrust issues the encryption keys for most major governments and companies in the world.

The Securities & Exchange Commission records reveals that at the same time Jerry C. Jones secretly became a director of ENTRUST, Inc., he also became a director of Acxiom Corp—a data analytics firm that appears to be a carbon copy of Cambridge Analytica and SCL Limited in the UK owned by the Queen's Privy Counsellor in charge of mass surveillance, Sir Geoffrey E. Pattie. See for yourself. Here is a PDF of the SEC filings. Here is an Excel spreadsheet showing the bevy of me-too beta-males and females who feed off of the Clintons and the SES in Little Rock, Arkansas.

What is an encryption key why is this discovery so devastating to the Deep State shadow government?

Put simply, encryption keys are used on both the sender’s and receiver’s computers to send data. It takes two keys to make a connection to send or receive data. The Clinton Administration created “trusted Certificate Authorities (CA)” to check with to make sure that the two keys are the real sender and receiver. If your keys are not approved by the CA, your connection will be blocked. In the hands of tyrannical globalists like Hillary Clinton, Barack Obama, George Soros, Eric Schmidt and Robert Mueller, this will be the new censorship on the Internet.

Fig. 8—Put simply, it takes two keys to establish an Internet connection—the sender's and the recipient's. Those two keys are combined to encrypt your data stream, then decrypt it once it has been received.

Encryption scrambles the contents of your messages then files and unscrambles them once they reach their intended destinations using digital keys managed by encryption engineers.

For example, the phrase “your cancer treatment program” would be encrypted with a digital key and travel through the Internet as “Qij\aq6NB5Lf@;kndFq7CN{Q{." So, even if it was intercepted it could not be read. The theory is that this knowledge of your medical condition would remain confidential between you and your doctor. Not so for Hillary, she would see you have cancer and could use that information for blackmail, extortion or murder, whatever worked for her.

Graphic: Oracle.

These CA’s make a big deal in their propaganda that you can “trust” them not to use or spoof your identity to get access to data that you and they are not authorized to have. That is a boldface lie. No wonder these people have the countenances of criminals. They are, and they know it.

Suppose you are the CA who issues keys to the FBI. Suppose you want to see the evidence being gathered against you in an investigation.

All you have to do is “borrow” the FBI key from Hillary or ENTRUST. Then you can connect to the target FBI computer using a bogus key created for you by ENTRUST, and voile! You then have two “trusted” keys so the FBI computers let you in. There are technical nuances to this description, but basically, you can do what you want with these keys. Don't let trollers try to baffle you with techno-jargon to throw your dogs off the scent. Lucifer (literally, IBM Triple-DES) is in these encryption details.

Hillary Clinton has this level of access to practically all data on the planet, including the FBI, NSA, Departments of State, Commerce, Energy, Treasury, GSA, Patent Office, Post Office, NIST, as well as numerous foreign government and commercial entities. SeeENTRUST 10-K Annual Reports (1998-2009). SEC Edgar.

Now that we finally know how the Clinton's stay one step ahead of the sheriff, we can now stop them.

More hard proof that Hillary Clinton is a digital monster

In this post, we will prove without a doubt how Hillary Clinton cleverly wormed her way into full access and control for 50,000 FBI encryption keys.

They are likely managing this empire from Obama’s Google-constructed U.S. Digital Service bunker three blocks from the White House manned by Valerie Jarrett and Eric Holder.

We admit that these findings sound more like Grisham fiction. But the evidence is a pesky thing. The evidence is now pouring out.

The evidence provided is “judicially recognizable” and indictable, we believe

“Notoriously public” information, like the U.S. Securities & Exchange Commission filings that we cite, is evidence that requires no further verification to be used in litigation, hence the adjective “notoriously.” This means that the information is so publicly noteworthy that further proof of validity is unnecessary. For example, John F. Kennedy was assassinated in 1963. That is a notoriously public fact and no proof is needed.

Notoriously public facts, like SEC filings, are “judicially recognizable” and can be accepted as truthful since the submitter attests to the SEC that they are true. It is criminal fraud to lie intentionally in SEC filings.

On Jun. 07, 1993, the new Clinton Administration convened the “Third CPSR Cryptography and Privacy Conference (CPSR - Computer Professionals For Social Responsibility).”

The conference was held two days before an important Jun. 09, 1993 House hearing on "encryption and telecommunications network security." The conference gathered over 106 attendees representing government, politics, commerce, manufacturing, industry, media, technology, telecommunications, healthcare, banking, education, faith and accounting. That’s plenty of arm-twisting, even for Washington, D.C.

The meeting sponsor was globalist advocate Carnegie Endowment for International Peace.

The hosts included:

(1) James P. Chandler, III, George Washington University intellectual property and national security law professor, and later patent attorney for social networking inventor Leader Technologies, Inc. (Jan. 2000);

2) John D. Podesta, chief of staff and campaign manager to Bill Clinton, Barack Obama and Hillary Clinton; and

(3) Stephen D. Crocker, founding member of the illegal public-private conspiracy group Highland’s Forum/Group (Feb. 1995), then Barack Obama’s director of ICANN (Internet Corporation for Assigned Names and Numbers) who ceded control to the UN on Oct. 01, 2016—one month before Donald J. Trump was elected president.

Hillary hid the 1993 encryption meeting attendee list

The information about this meeting was hidden on Hillary’s private email server. It was unearthed by corruption watchdog Judicial Watch after they pressed the State Department in court to release the document.

In 1993-1994, more than 20 people close to or investigating Clinton corruption died under suspicious circumstances.

Theft & Weaponization of U.S. inventions

In Feb. 1995, the Highlands Forum/Group was formed. It was and is a highly illegal private “public-private” meeting sponsored by the Department of Defense Net Assessment group run by Senior Executive Service (SES) members Richard P. O'Neill and Andrew W. Marshall. See also AFI. (Nov. 22, 2017). The Weaponization of Social Media Should Concern Us All. Americans for Innovation.

On Apr. 17, 1995, Clinton signed Executive Order 12958 titled "Classified National Security."

This order consolidated control of classification procedures to just seven people: (1) Secretary of State, (2) Secretary of Defense, (3) Attorney General, (4) C.I.A. Director, (5) U.S. Archivist, (6) National Security Director and (7) the President.

A most dubious provision said that any U.S. security classification that contradicted another country's laws or treaty rendered it of no effect. In other words, if Obama wanted to release a classified document, all he had to do was call up Justin Trudeau in Canada and ask him to pass a law saying America’s XYZ classified information was harmful to beavers on the northern slopes. That would nullify the U.S. classification and give Obama the excuse to release it. Clearly, it was a precursor to Obama’s foreign trade entanglements in the Trans-Pacific Partnership (TPP) that President Trump killed, thankfully.

On Apr. 19, 1995, the Alfred P. Murrah Federal Building in downtown Oklahoma City, was bombed by Timothy McVeigh and Terry Nichols—just two days after Bill Clinton formed a secret White House intelligence operation via Executive Order 12958 cited above.

This bombing created more excuses for mass surveillance against Americans. Notably, Clinton body guard Alan G. Whicher was killed in this weapons grade-energy blast that could not have been caused by a fertilizer bomb, as were led to believe by MSM. Retired FBI superstar Theodore L. Gunderson, a short-list candidate to be FBI director, revealed that psychiatrist Dr. Jolly West, one of the founders of the C.I.A. MKUltra mind control program, paid a visit to McVeigh before the trial. Gunderson said he believed that McVeigh was a brainwashed MKUltra drone.

Laws changed to prepare for the Patriot Act abolishment of the Bill of Rights

Between 1995-1999, a series of national security laws, executive orders (EOs) and presidential policy directives (PPDs) were written for Clinton by James P. Chandler, III, his national security and intellectual property advisor.

Magically, the laws that Chandler drafted passed nearly unanimously. (Note: Whenever that occurs, all of Congress has been bought off or fooled en masse before the vote. Remember: Clinton had likely already had access to the FBI encryption keys by this time. Therefore, he had amassed plenty of blackmail and extortion information on every influential member of Congress.)

On Feb. 28, 1996, FBI Director Louis Freeh self-consciously deferred to James P. Chandler, III in his testimony on economic espionage, revealing that Chandler controlled FBI security policy for Clinton. Freeh was clearly the puppet and Chandler the puppet master.

On Oct. 11, 1996, Congress passed three Clinton-Chandler laws that were used to further gut Congressional oversight over security and privacy. It enabled the FBI to increase mass surveillance, then lie about it.

Hindsight shows that the names for these laws were a cruel, unlawful, immoral, devilish deceit and had the opposite of the intentions of the rogue C.I.A., Clinton's, Chandler, Mueller, Comey, etc. to fuel economic espionage, theft of trade secrets and lying to Congress, courts, the President and We the People.

Mar. 5, 1998—Jul. 11, 1999, Clinton and Gen. Wesley Clark prosecuted the Kosovo fraud based on a so-called “Račak genocide massacre” false flag. French journalists have proved that Račak was completely staged. However, it did succeed in cajoling Congress to approve U.N. intervention (led by Gen. Wesley K. Clark), and it succeeded in disabling Orthodox Christian resistance to the planned jihadi migration wave now occurring.

On Aug. 06, 1998, Robert S. Mueller, III's law firm Hale & Dorr (now Wilmer Hale) helped file "The Internet of Things" patents for Hewlett-Packard’s Richard C. Walker that described a global surveillance grid that even monitors and controls individual body functions and describes human beings as "wet-ware." The invention also contains an accounting and taxing capability to manage "certificate authorities" to control Public Key Infrastructure (PKI) encryption, tax the Internet and control "wet-ware" access.

Fig. 13–Hillary Clinton has controlled ENTRUST INC ever since his 19-year Rose Law Firm partner Jerry C. Jones was secretly slipped onto the Board of ENTRUST INC. in Dec. 2003, just after thge IBM Eclipse Foundation received the debugged version of Leader Technologies' social networking engineering source code from Leader's patent lawyer James P. Chandler, III, who was secretly working with IBM and the rogue C.I.A. to build a new mass surveillance system based on social networking. SeeFederal PKI Graph.

On Aug. 18, 1998, Entrust Technologies, Inc. went public after being started as a spin-off of Nortel Networks (Canada) to manage and distribute Public Key Infrastructure (PKI) Certificate Authorities—the encryption keys for the Internet. Their customers include important military, banking, healthcare and government entities in the U.S., U.K., Australia, Canada, Sweden, Denmark, France, Italy, Spain and China.

On Dec. 20, 1998, globalist psychopath George Soros admitted to having been a Hungarian Jewish Nazi collaborator without remorse for betraying his own Jewish brothers and sisters.

On Mar. 09, 1999, Clinton's Vice President Al Gore took credit for founding the Internet, laughably.

On Jul. 01, 1999, Clinton Attorney General Janet Reno created a new "Office of Special Counsel" inside the Department of Justice after the Special Counsel law was not re-authorized by Congress. This dubious Department of Justice policy (not a law) is now being used to justify the Mueller witch hunt.

Summers' former Treasury staffer (1993-2001), Marne L. Levine (Deutch) became Summers' chief of staff starting at Harvard on Jul. 02, 2001 where she oversaw the C.I.A.'s MKUltra establishment of the 19-year old Mark Zuckerberg as their Facebook cardboard cut out. Then, she became product vice president at AOL on Apr. 06, 2009. Then, she became Summers' chief of staff for the National Economic Council on Jan. 21, 2009. Then, she became Obama's Special Assistant to the President for Economic Policy on Jun. 24, 2010. Then, she attended an exclusive dinner with Hillary and Sandberg on Mar. 27, 2012. Then, she became chief operating officer of Instagram on Oct. 07, 2014. Truly magical.

On Jul. 14, 1999, the Clinton White House set up a spy skunk works that has run rogue intelligence operations called the “National Infrastructure Assurance Council (NIAC)” On Jan. 18, 2001, Clinton appointed James P. Chandler, III and Bill Gates, Microsoft, as directors on NIAC the day before he left office and the same day he pardoned his former CIA director John M. Deutch (Marne L. Levin-Deutch's father in law) and fraudster Marc Rich.

On Sep. 16, 1999, Clinton announced "relaxed" encryption rules in a flurry of press releases and letters to Congress, which were most assuredly drafted by national security advisor James P. Chandler, III. This action effectively gutted normal engineering security practices. It had the effect of enabling unfettered foreign and domestic access to U.S. classified data.

On Sep. 29, 1999, Bill Clinton established In-Q-Tel Silicon Valley cardboard cutouts for the C.I.A. to be able to raise private venture capital funds to build its rogue operations. It is illegal for a government agencies to invest in private companies.

Fig. 15–On Sep. 29, 1999, Clinton C.I.A. institutionalized crony capitalism and the digital take over of America by a Shadow Government, on this day, by forming a "private" venture capital company named In-Q-Tel (Intel with a Q) to create a private funding and control vehicle for the rogue C.I.A.

On Nov. 17, 1999, Agilent Technologies went public using Robert S. Mueller’s III’s law firm Hale and Dorr (renamed Wilmer Hale). Agilent Technologies was tasked with building the digital infrastructure for “The Internet of Things” global mass surveillance of everything using the Richard C. Walker HP/Agilent patents for monitoring all human beings called “wet-ware” in the patents.

On Jun. 08, 2000, Clinton espionage attorney James P. Chandler, III, participated in seminal Leader invention design meetings as Leader’s newly-appointed patent attorney. He was fully briefed on Leader’s social networking innovations at this meeting (see photo below) without disclosing his Deep State shadow government conflicts of interest and treachery.

Fig. 16—On Jun. 08, 2000, JAMES P. CHANDLER, IIII, BILL CLINTON SPY MASTER first learned about Leader/McKibben's social networking designs in early 2000. By this meeting on Jun. 8, 2000 he was studying every detail. Chandler is pictured here seated in the white shirt against the wall on the right side of this photo with his legal assistant Kelley E. Clements to the viewer's right. Co-inventor Michael McKibben and Jeffrey Lamb are picture standing in the back left of the photo.
Photo: Leader Technologies, Inc.

On Jun. 20, 2000, Sir Geoffrey E. Pattie was awarded the ISSA Silver Star Award in Washington, D.C. Pattie is the primary spy director for the Queen’s Privy Council and founder of SCL Ltd. and Cambridge Analytica—two C.I.A. MKUltra mind control and brain washing operations in the UK.

On Aug. 25, 2000, F. Gary Davis, Acting Director of the U.S. Office of Government Ethics, issued a tortured 13-page "advisory" that dramatically muddied the waters on mutual fund investing disclosure. Davis left government service soon thereafter. This opinion opened the door to massive nondisclosure fraud by politicians, SES and federal bureaucrats.

On Apr. 15, 2001, C.I.A. whistleblower Susan Lindauer warned American senior intelligence leadership that "I first learned of the 9/11 Conspiracy from my CIA handler, Dr. Richard Fuisz, in mid-April, 2001." She was imprisoned for a year without due process to shut her up as the first casualty of The Patriot Act.

In Jul. 2001, Department of Justice John C. Yoo was hired into the Office of Legal Counsel (OLC) and gave legal opinion cover for a proposed NSA project “Stellar Wind” for mass surveillance of American citizens.

On Sep. 04, 2001, Robert S. Mueller, III was sworn in as FBI Director by President George W. Bush, just 10 days before 9/11.

On Sep. 11, 2001, World Trade Center, Pentagon and Shanksville “terror” attacks were timed simultaneously with DoD NORAD war games and a stand down order.

On Oct. 16, 2001, President Bush signed Executive Order 13231 "Critical Infrastructure Protection in the Information Age" forming the "National Infrastructure Advisory Council (NIAC)." The order used the same NIAC acronym used by Clinton as the excuse for setting up a mass surveillance networking operating center run out of the White House.

On Oct. 26, 2001, President Bush signed The Patriot Act that has essentially destroyed the Bill of Rights. Just look at the flies that gathered to watch the signing.

Fig. 17—On Oct. 26, 2001, a 132-page, seemingly ready-made USA PATRIOT Act was approved by an Act of Congress that was signed into law by President George W. Bush on October 26, 2001. With its ten-letter abbreviation (USA PATRIOT) expanded, the full title is "Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001."

On Oct 31, 2001, NSA whistleblower and former chief architect William E. Binney resigned the NSA saying the agency had "gone rogue."

On Nov. 29, 2001, IBM intellectual property attorneys James P. Chandler, III and David J. Kappos used a $40 million IBM “donation” to start the IBM Eclipse Foundation which has been the exclusive distributor of Leader Technologies’ social networking innovations.

On Aug. 29, 2002, IBM Eclipse Foundation distributed Version 2.0.1 that included all of Leader Technologies' social networking innovations.

On Sep. 18, 2002, career IBMer Thomas E. Noonan (Internet Security Systems, Inc.) was appointed to the National Infrastructure Assurance Council (NIAC) by George W. Bush, surely recommended by James P. Chandler, and he remains a member of the Council to this day. In 2003, Noonan became a partner to ENTRUST INC. Public Key Infrastructure (PKI) controlled by Hillary Clinton.

On Dec. 04, 2002, the entire Silicon Valley military-industrial complex began joining the IBM Eclipse Foundation to receive Leader Technologies' social networking invention source code, all of which IBM criminally claimed copyright, and then criminally declared "open source." They admitted a "single company [Leader Technologies]" for their code.

Fig. 18—On Dec. 04, 2002, Eclipse released Version 1.0.1. The development effort set as its priority to change the Leader SWING design to SWT to conform to IBM preferences. They disclosed everything except Leader’s name in the statement: "Eclipse 2.0 was based primarily on contributions of a single company [Leader Technologies, Inc.]."

On Oct. 29, 2003, ENTRUST INC was awarded the contract to supply all 50,000 encryption keys for the Federal Bureau of Investigation (FBI).

On Dec. 04, 2003, ENTRUST INC elected Jerry C. Jones as a "Class I" director to replace retiring Gen. Wesley K. Clark. Jones is a 19-year Hillary Clinton partner at the Rose Law Firm, Little Rock, Arkansas. With the appointment of Jones, FBI Director Robert S. Mueller, III had an ethical duty to disclose to the public that his approval of ENTRUST INC to manage 50,000 FBI encryption keys enabled his political mentor Hillary Clinton to have full access to the entire FBI operation.

On Mar. 11, 2009, ENTRUST INC. issued its last 10-K annual report before selling its operation to Orlando Bravo and his Thoma Bravo, LLC private equity firm in San Francisco, CA. They disclosed that they had "more than 2,000 customers in 60 different countries."

On Jul. 16, 2009, ENTRUST, INC. proposed to shareholders to sell to Orlando Bravo and his Thoma Bravo, LLC private equity firm in San Francisco, CA., which occurred on Aug. 07, 2009.

Conclusions:

Conclusion #1: Robert S. Mueller, III had an affirmative duty to disclose his approval of the contract for ENTRUST to manage the FBI's 50,000 encryption keys in late 2003. The FBI itself has been scandalously compromised to Hillary Clinton and the Rose Law Firm ever since.

Conclusion #2: ENTRUST's planetary control of the encryption keys for "over 2000 customers in 60 different countries" means that any matter handled by their customers at the FBI, Department of State, NSA, Treasury, etc. is the fruit of a poisonous tree—tainted by Clinton corruption.

Conclusion #3: President Trump has enough evidence here to seize and prosecute the leaders of every government agency that has involved that agency, or induced other agencies to work with ENTRUST, without disclosing their total compromise to Hillary Clinton and her crime syndicate.

Clearly, Hillary Clinton's director surrogate at ENTRUST, INC., Jerry C. Jones (2003-2009), steered the development of the company's control over encryption keys for the maximum benefit of his Clinton overlords.

At a bare minimum, Mueller and the FBI leadership has had an ethical duty ever since Jerry C. Jones became an ENTRUST director to disclose his direct conflict of interest and compromise of FBI operations by Hillary Clinton, his mentor.

51 comments:

You can't make this stuff up! It turns out Judge Kavanagh’s Mother was the Judge who foreclosed on Christine Blasey Ford’s Parents’ home! Furthermore, pro-Chinese Sen Diane Feinstein and company apparently had this alleged accusation months ago – why release it at the last minute?

It's interesting to note that the accuser of Judge Kavanaugh, Christine Blasey Ford, is a progressive-leftist professor of Social Work at Palo Alto University & teaches in consortium with Stanford University. (By the way, she thought the Women's March "...didn't go far enough!")

Keep in mind, Stanford is a notorious hot-bed of Frankfurt School neo-Marxist social engineering that has given us the likes of: Sen. Diane Feinstein (D-CA), Rep. Adam Schiff (D-CA), Valerie Jarrett, Larry Page (Google), Reed Hastings (Netflix), Phil Knight (Nike), Rachel Maddow, Xavier Becerra (Attorney General of California), Cheryl D. Mills (Counselor and Chief of Staff to Hillary Clinton during her whole tenure as United States Secretary of State) and even Chelsea Clinton!

But perhaps the most interesting Alumni (given Stanford's reputation as a CIA recruitment center) is R. James Woolsey Jr. currently a Senior Vice President at security firm Booz Allen Hamilton (remember Edward Snowden?).

James Woolsey was CIA director when Aldrich Ames was arrested for treason and spying against the United States. It was Aldrich Ames that recruited the young communist John Brennan; who went on to become the Station Chief in Riyadh Saudi Arabia during 9/11 (even signing the Visa's of the alleged Saudi conspirators) before going on to become the bellicose CIA director under Obama – nicknamed "the Drone King."

It seems James Woolsey and the CIA were: '... criticized for not focusing on Ames sooner, given the obvious increase in Ames' standard of living; and there was a "huge uproar" in Congress when Woolsey decided that no one in the CIA would be dismissed or demoted at the agency. Woolsey declared: "Some have clamored for heads to roll in order that we could say that heads have rolled...Sorry, that's not my way." Woolsey abruptly resigned on Dec 28, 1994.' (Wikipedia)

Also an interesting, and perhaps relevant, Stanford Alum is Jared Cohen:

'CEO of Jigsaw (previously Google Ideas) and an Adjunct Senior Fellow at the Council on Foreign Relations. Previously, he served as a member of the Secretary of State's Policy Planning Staff and as an advisor to Condoleezza Rice and later Hillary Clinton. Initially brought in by Condoleezza Rice as a member of the Policy Planning Staff, he was one of a few staffers that stayed under Hillary Clinton later referenced in an article entitled "Tweeting While Tehran Burns." In this capacity, he focused on counter-terrorism, counter-radicalization, Middle East/South Asia, Internet freedom, and fostering opposition in repressive countries.' (Wikipedia) Hmm? "...fostering opposition in repressive countries." What this really means is regime change à la George Soros "Color Revolutions."

In light of this, the technology policy expert Alec Ross, Senior Advisor for Innovation to Secretary of State Hillary Clinton, sent an e-mail saying: "Jared [Cohen] and I met with Stanford President John Hennessy last week and we will work through Stanford to indirectly launch an innovation competition for the best apps and programs that provide tools for circumvention of politically motivated censorship." My, my, my?

The woman accusing President Trump’s United States Supreme Court nominee Brett Kavanaugh of a “rape attempt” when the two were in high school previously signed a letter fighting Trump’s “Zero Tolerance” policy at the U.S.-Mexico border.

The American Civil Liberties Union (ACLU)—an open borders advocacy organization—letter was written and sent to Department of Homeland Security (DHS) Secretary Kirstjen Nielsen and Attorney General Jeff Sessions in June.

Christine Blasey Ford, a psychology professor, signed the ACLU letter as “Christine Blasey Ph.D. Psychologist,” signing off on statements that accused Trump of using southern border enforcement to “traumatize children” and claimed the Zero Tolerance policy was “violating fundamental human rights.”

The policy to prosecute all illegal border crossers, enacted by the Trump administration, including illegal alien adults who cross the border with children, results in border-crossing parents having their children taken into federal custody. This is a loophole known as the Flores Settlement Agreement.

Detaining child border crossers was a policy during the Obama administration when Breitbart Texas exclusively reported on the conditions in which unaccompanied minors were being packed into crowded cells and holding facilities. As Breitbart News reported, the federal government has separated adult border crossers from the children they have brought with them into the U.S. as far back as 2001, court records reveal.

Christine Blasey-Ford, Brett Kavanaugh's accuser, has a brother worked for a law firm that retained Fusion GPS.

Christine Blasey-Ford, the 51-year-old woman who has come out of the woodwork at the last minute, accusing Brett Kavanaugh of sexually assaulting her as a teenager, has a brother who worked for a law firm that later retained Fusion GPS, the primary “fixer” for the Clintons and the DNC.

Ralph Blasey, brother of Christine Blasey-Ford, worked for 15 years as a Litigation Partner for Baker Hostetler, a law firm that ended up retaining Fusion GPS, the infamous D.C. company that produced the unverified Steele dossier on President Donald Trump and Russia, sparking the whole Russian collusion investigation.

(VARIETY.com) WASHINGTON — Roger Stone, the political consultant who served as informal adviser to the Trump campaign, said it is “conceivable” that special counsel Robert Mueller will “bring some bogus charge against me,” but he can’t think of any circumstance in which he’d testify against President Donald Trump.

In an interview with Variety‘s “PopPolitics” on SiriusXM’s political channel POTUS, Stone said, “it is possible the special counsel could bring an action against me that is designed to make me testify against Donald Trump, who I have known on an intimate basis for almost 40 years.”

He added, “I do not work in the Trump White House. There are some things he has done as president that I do not agree with, and other things that he has done as president that I do agree with. But that said, I can’t think of any circumstance under which I would be willing to testify against him.”

President Trump has ordered the release of key documents regarding the FISA court warrant on Carter Page, all reports of FBI interviews with Bruce Ohr, as well as “the release of all text messages relating to the Russia investigation, without redaction, of James Comey, Andrew McCabe, Peter Strzok, Lisa Page, and Bruce Ohr.”

North Korean leader Kim Jong Un said on Tuesday his “historic” summit with U.S. President Donald Trump in Singapore stabilized regional security, and that he expected further progress at an inter-Korean summit aimed at reviving stalled nuclear diplomacy.

Kim thanked South Korea’s President Moon Jae-in for bringing about the Singapore meeting in June as the two leaders began their third round of talks in Pyongyang.

“Thanks to that, the political situation in the region has stabilized and I expect more advanced results,” Kim told Moon, referring to the Singapore gathering, at the start of their talks.

In this edition of “Inside Judicial Watch,” JW Senior Attorney Ramona Cotca joins host Jerry Dunleavy to discuss the latest developments in our battle to get to the truth about the Department of Justice’s relationship with Fusion GPS, the opposition research firm that produced the Clinton-DNC dossier on Trump.

One of the most heinous things about taxes is that they support the very “organs” (to quote a Soviet-era term) of government that crush the people…even further.

The taxes are weapons used by the authorities…and all authority comes from the barrel of a gun (to paraphrase Mao). The taxes are used to corral in the masses and keep them upon a continuous treadmill that sustains the system…the very system that exploits and enslaves the citizens.

The most heinous of all is the “death tax” of 50% to the government after you die. If you made a million in money and property at the end of your existence…paying taxes on it all the way…the original income taxes on the money you made, and then the interest income tax on what you made from your investments. You have property taxes on your house. You are (depending on your state) levied taxes on ad valorem, or state income taxes, or community (city, town) taxes. You are taxed on gifts you give to your children. You are taxed when you begin a business.

why,why, are these leftwing democrats trying to pull off a coup. They all have been caught just a matter of time to get them indited and sent to jail. I think Americans are sick of this slow walking everything trying to get to midterms were I think they are going to get their asses kicked.

Hundreds of apps are able to scan and share data from the email inboxes of Gmail accounts, Google has revealed.

In a letter to US lawmakers, which was made public on Thursday, Google explained that third-party developers are able to both access and share data from Gmail accounts – though the company said it thoroughly vets any third parties that are granted access, and permission must be given by the user.

The inbox scanning takes place despite Google ending its own controversial email-scanning practice a year ago.

"Developers may share data with third parties so long as they are transparent with the users about how they are using the data," Susan Molinari, Google's head of US public policy, wrote in the letter, which was first seen by the Wall Street Journal.

More deception. Google insists that the users give permission to use their personal information, and that they are transparent. What they neglect to say is that no one can use Google without giving away all user rights in their personal information in exchange for using the services!

Patrick Howley. (Sep. 25, 2018). EXPOSED: Kavanaugh Second Accuser Is A Left-Wing Activist Who Campaigned Against The Word ‘Sissy’. Big League Politics.

Brett Kavanaugh’s second accuser Deborah “Debbie” Ramirez is a left-wing activist who spoke at a PFLAG (Parents, Families and Friends of Lesbians and Gays) event and agitated against use of the word “Sissy” on T-shirts handed out at an annual Colorado 10k run.

Ramirez, who claimed with no evidence that Kavanaugh exposed himself at a college party, is the senior volunteer coordinator for the Boulder County Department of Housing and Human Services. She is known colloquially as “Debbie.”

Sam Biddle. (Sep. 26, 2018). THE GOVERNMENT WANTS AIRLINES TO DELAY YOUR FLIGHT SO THEY CAN SCAN YOUR FACE. The Intercept.

OMNIPRESENT FACIAL RECOGNITION has become a golden goose for law enforcement agencies around the world. In the United States, few are as eager as the Department of Homeland Security. American airports are currently being used as laboratories for a new tool that would automatically scan your face — and confirm your identity with U.S. Customs and Border Protection — as you prepare to board a flight, despite the near-unanimous objections from privacy advocates and civil libertarians, who call such scans invasive and pointless.

According to a new report on the Biometric Entry-Exit Program by DHS itself, we can add another objection: Your flight could be late.

Although the new report, published by Homeland Security’s Office of the Inspector General, is overwhelmingly supportive in its evaluation of airport-based biometric surveillance — the practice of a computer detecting your face and pairing it with everything else in the system — the agency notes some hurdles from a recent test code-named “Sprint 8.” Among them, the report notes with palpable frustration, was that airlines insist on letting their passengers depart on time, rather than subjecting them to a Homeland Security surveillance prototype plagued by technical issues and slowdowns:

September 26, 2018- JW Director of Investigations and Research Chris Farrell appeared “Lou Dobbs Tonight” on the Fox Business Network to discuss whether Rod Rosenstein will be fired and the Kavanaugh hearing.

John Solomon. Oct. 08, 2018). Former FBI lawyer: Plot to record, remove Trump not a joke. The Hill.

Don’t tell former FBI general counsel James Baker that those now-infamous discussions about secretly recording President Donald Trump and using the tapes to remove him from office were a joke.

He apparently doesn’t believe it. And he held quite the vantage point — he was on the inside of the bureau’s leadership in May 2017, when the discussions occurred.

Baker told Congress last week that his boss — then-Acting FBI Director Andrew McCabe — was dead serious about the idea of surreptitiously recording the 45th president and using the evidence to make the case that Trump should be removed from office, according to my sources.

Baker told lawmakers he wasn’t in the meeting that McCabe had with Deputy Attorney General Rod Rosenstein in which the subject came up. But he did have firsthand conversations with McCabe and the FBI lawyer assigned to McCabe, Lisa Page, about the issue.

FLASHBACK TO AUGUST 4, 2016: “Pervasive ties have been uncovered that directly link the former and current personal legal counsels to President Obama, Robert F. Bauer (PDF) (No. 23), and his wife, Anita B. Dunn, and their long-time law firm, Perkins Mao-Tse-TungCoie LLP, with the Facebook Cabal.

Y’all remember Anita Dunn..right?

Her favorite political philosopher is Mao Tze Tung.

Remember the article recently regarding another attorney from Perkins Coie – Michael Sussman? See here. Connect the dots. They couldn’t be more obvious.

This would all make more sense had her emails not been hacked...You would think that with the Power of holding "50,000 Keys" this Simple Moron could spare a few to her Useful Idiots...Nice eye catching Headline on a baseless story... I'm thinking that also with the ability to control as much as you claim, this Hideous Whore would be the last person anyone would trust with that capability...And surely with the new administration, it would be corrected as with the rest of the incompetent bullshit that has taken place...

NOTICE TO COMMENTERS: When the MSM diatribe on "fake news" began, our regular commenters were blocked from posting comments here. Therefore, email your comments to a new secure email addess afi@leader.com and we will post them.

SENIOR EXECUTIVE SERVICE (SES) HIJACKED THE INTERNET

LEGEND: Some corruptocrat photos in this blog contain a stylized Christian Celtic Wheel Cross in the background alongside the text "Corruption Central" meaning we have put the person's conduct under the microscope and discovered that he or she is at the center of global corruption. Judge Amy Berman Jackson asserts that it is unambiguously (to her anyway) a rifle cross hair. This shows her woeful ignorance of theology, history, symbology and engineering. It could be many things, but she clearly wanted to see a rifle sight (ask her about her role in Fast and Furious gun running). Others assert equally ignorantly that it is a pagan or white supremacist symbol. This stylized Christian Chi-Rho Cross dates to 312 A.D. when

Emperor Constantine adopted the symbol after his history-changing "By this sign, you shall conquer" vision on the Milvian Bridge. A similar Wheel Cross form was widely used in Ireland by the eighth century. The triple entendre indicates that the person's corrupt life, when studied under a microscope, has been found wanting, but that there is hope in Christ if the person repents from his or her wicked ways. It triples as a reticle or graticule built into all sorts of eyepieces in microscopes, oscilloscopes, surveying instruments, astronomy optics, precision pointers, binoculars, etching equipment, and yes, gun sights, but also computer mouse pointers! Therefore, to claim that it could only mean a gun sight, as Judge Jackson did, is truly ignorant. As shown, it is a call to prayer and repentance based upon microscopic observation of the corruptcrat's conduct. For Judge Jackson to use her ignorance of this symbol as the excuse to gag Roger Stone's FREE SPEECH right to defend himself is heinous abuse of authority. Chief Justice John Roberts should censor her immediately. Patriots must demand it.

Roger Stone Speaks: On Nov. 18, 2017, Twitter censored New York Times best-selling author Roger Stone completely. Every red-blooded American should be outraged, Republican, Democrat and Independent alike. If Roger's voice is silenced today, yours is next. We must break this embargo. Click here to read and share Roger's latest perspectives on the Battle for our Republic, including his responses to his critics (who have not been censored).

BARACK OBAMA'S DARK POOLS OF CORRUPTION

STOP FACEBOOK PROPERTY THEFT

WILL HUMANKIND EVER LEARN? Facebook's Orwellian doublespeak about property and privacy (theft) merely repeats the eventual dehumanization of the individual under MAO's Red Star, Stalin's SOVIET Hammer & Cycle and Hitler's NAZI Swastika. Respect for the inalienable rights of each individual is a bedrock value of democracy. The members of the Facebook Cabal abuse this principle at every opportunity. They evidently believe that they deserve special privileges and are willing to lie, cheat and steal in order to treat themselves to these privileges.

ASK CONGRESS: PASS THE INVENTOR PROTECTION ACT!

Click image above to download a poster-quality PDF optimized for a 11in. x 17in. (ledger-size) poster. America should not be in the business of cheating its entrepreneurial investors simply because the cheaters buy off judges with the money gained from their theft. Such permissiveness is obscene.

LEADER V. FACEBOOK BACKGROUND

Jul. 23, 2013 NOTICE:DonnaKlineNow! has gone offline. All her posts are available as a PDF collection here (now updated, post-Scribd censorship).

Mar. 20, 2014 READER NOTICE: On Mar. 7, 2014, all of our documents linked to Scribd were deleted by that "cloud" service using the flimsiest of arguments . Some of our documents have been there for two years and some had almost 20,000 reads.

George Orwell wrote in 1984 that one knows one is in a totalitarian state when telling the truth becomes an act of courage.

This statement followed right after Davis cited Facebook's chief inside counsel in the Leader v. Facebook case, Theodore Ullyot, who appears to have helped lead the Leader v. Facebook judicial corruption. Interesting word choices associated with Gibson Dunn LLP: manipulation, smear. Attorneys swear a solemn oath to act morally, ethically, and in support of democratic principles. They promise to conduct themselves in a manner than instills confidence among the citizenry in the rule of law and the judicial system. These promises appear to be meaningless. Click here for a PDF version of Julie Davis' article.

OUR MISSION

American citizens must fight abuse of the constitutional right for authors and inventors to enjoy the fruits of their inventions, as a matter of matter of basic property rights and sound public policy. Otherwise, instead of innovation, creativity, genius, ideas, vision, courage, entrepreneurship, respect, property, rejuvenation, morals, ethics, values, renewal, truth, facts, rights, privacy, solutions and judicial faithfulness,

If we do not speak up, impeach derelict judges and imprison corrupt attorneys, we cannot possibly hope to start fixing the current ills in our society. Without justice and respect for private property, democracy has no sure foundation.

CURRENT EDITORIAL FOCUS

We are an opinion blog that advocates for strong intellectual property rights. We welcome commenters and contributors. The Leader v. Facebook patent infringement case first came to our attention after learning that the trial judge, Leonard P. Stark, U.S. District Court of Delaware, ignored his jury’s admission that they had no evidence to support their on-sale bar verdict, but the judge supported it anyway.

The judicial misconduct has deteriorated from there, replete with two of the three judges on the Federal Circuit appeal panel, Judges Alan D. Lourie and Kimberly A. Moore, holding Facebook stock that they did not disclose to the litigants, and later tried to excuse through a quick motion slipped in at the last minute by the Clerk of Court, Jan Horbaly, and his close friends at The Federal Circuit Bar Association. (The DC Bar subsequently revealed that Mr. Horbaly is not licensed to practice law in Washington D.C.)

The judges ignored shocking new evidence that Mark Zuckerberg withheld 28 hard drives of 2003-2004 evidence from Leader Technologies that could prove actual theft (and therefore claims even more serious than infringement). In addition, Facebook's appeal attorney, Thomas G. Hungar of Gibson Dunn LLP, has close personal ties to just about every judicial player in this story. The misconduct appears to reach into the U.S. Patent Office through abuse of the reexamination process by Facebook. We will stay focused on Leader v. Facebook until justice is served, but we also welcome news and analysis of intellectual property abuse in other cases as well.

WELCOME TO DONNA KLINE NOW! READERS!

AFI has been supporting Donna and is now picking up the main Leader v. Facebook coverage (she will continue coverage as well).

Anonymous Posts Are Welcomed! Blogger has more posting constraints than Donna's WordPress, but we will continue to welcome anonymous posts. Simply send us an email at NEW Leader® Private Email:afi@leader.com with your post. Once the moderator verifies that your email address is real, your comment will be posted using your real name or handle, whatever you wish, like John Smith or Tex.

CODE OF CONDUCT FOR U.S. JUDGES

GALLERY OF JUDICIAL MISCONDUCT

Judge Leonard P. Stark, U.S. District Court of Delaware, trial judge in Leader Techs, Inc. v. Facebook, Inc., 770 F. Supp. 2d 686 (D.Del. 2011). Judge Stark heard his jury foreman admit that the jury made the on-sale bar decision without any evidence other than speculation, and yet he supported that verdict anyway. Just months before trial, Judge Stark allowed Facebook to add the on-sale bar claim after the close of all fact discovery and blocked Leader from preparing its defenses to this new claim.
Judge Stark allowed the claims despite Leader's prophetic argument that the action would confuse the jury and prejudice Leader. He also permitted the jury to ignore the Pfaff v. Wells Electronics, Inc. test for on-sale bar, even after instructing the jury to use it. (See that Jury Instruction No. 4.7 here.) He also contradicted his own instruction to Leader to answer Interrogatory No. 9 in the present tense (2009), then permitted the jury to interpret it as a 2002 admission as well. Facebook's entire on-sale bar case is based upon this interrogatory. (Editorial: Hardly sufficient to meet the "heavy burden" of the clear and convincing evidence standard.)

Judge Alan D. Lourie, U.S. Court of Appeals for the Federal Circuit, panel judge in Leader Techs v. Facebook, Inc., 678 F.3d 1300 (Fed. Cir. 2012). Judge Lourie stood to benefit financially from undisclosed holdings in Facebook. See analysis of Judge Lourie's T. Rowe Price holdings re. the Facebook IPO. Judge Lourie also failed to apply his own law-test in Group One v. Hallmark Cards to the evidence. After debunking all of Facebook's evidence on appeal, Judge Lourie created new argument in the secrecy of chambers to support Facebook and prevent the on-sale bar verdict from being overturned—a clear breach of constitutional due process.

Judge Kimberly A. Moore, U.S. Court of Appeals for the Federal Circuit, panel judge in Leader Techs v. Facebook, Inc., 678 F.3d 1300 (Fed. Cir. 2012). Judge Moore stood to benefit financially from undisclosed holdings in Facebook. See disclosure of substantial holdings in Facebook and Facebook-related stocks. Judge Moore failed to follow the long-held precedent for testing on-sale bar evidence in Pfaff v. Wells Electronics, Inc.—an evident and intentional omission coming from a former patent law professor. After debunking all of Facebook's evidence on appeal, Judge Moore created new argument in the secrecy of chambers to support Facebook and prevent the on-sale bar verdict from being overturned—a clear breach of constitutional due process.

Judge Evan J. Wallach, U.S. Court of Appeals for the Federal Circuit, member of the three-judge panel in Leader Techs v. Facebook, Inc., 678 F.3d 1300 (Fed. Cir. 2012). Judge Wallach is not a patent attorney. This begs the question as to why a judge with no knowledge of patent law was assigned to the case. Would anyone ask a dentist to perform brain surgery? The Federal Circuit was specially formed to appoint patent-knowledgeable judges to patent cases.
There is no evidence so far in the judicial disclosures that Judge Wallach holds stock in Facebook, although when he was asked on a motion to disclose potential Facebook holdings and other conflicts of interest, he refused along with the other judges. See Motion to Disclose Conflicts of Interest.
Judge Wallach continued in silence even after Clerk of Court Horbaly failed to provide him with Dr. Lakshmi Arunachalam’s motions (according to his Federal Circuit staffer Valeri White), and yet the Clerk signed an order regarding that motion on Judge Wallach’s behalf. See a full analysis of these events at Donna Kline Now! Judge Wallach also failed to police his court’s violation of Leader’s Fifth and 14th Amendment constitutional right to due process when he participated in the fabrication of new arguments and evidence for Facebook in the secrecy of judge's chambers after he had just invalidated Facebook’s sole remaining item of evidence (using disbelieved testimony as ostensible evidence of an opposite).
Judge Wallach also failed to police his court when he failed to apply the Supreme Court's Pfaff v. Wells Electronics, Inc. test for on-sale bar evidence, which included even the Federal Circuit’s own Group One v. Hallmark Cards, Inc. test—a test which Judge Lourie should have advised Judge Wallach to follow since Judge Lourie helped write that opinion. Group One test omission analysis.

Clerk of Court Jan Horbaly, U.S. Court of Appeals for the Federal Circuit, clerk who signed all the opinions in Leader Techs v. Facebook, Inc., 678 F.3d 1300 (Fed. Cir. 2012). Clerk Horbaly and his staff obfuscated when the court's ruling was challenged by an amicus curiae brief revealing clear mistakes of law and new evidence. See analysis of the misconduct and misrepresentations within the Federal Circuit Clerk of Court in Leader v. Facebook.
Mr. Horbaly failed to disclose his conflicts of interest and close associations with numerous Facebook attorneys and law firms, as well as his close association with one of Facebook's largest shareholders, Microsoft, who is a Director of The Federal Circuit Bar Association where Mr. Horbaly is an ex officio officer. Additionally, the DC Bar revealed in a written statement that Clerk Horbaly is not licensed to practice law in the District of Columbia. [Editorial: What does that make the Federal Circuit with its location within in a stone's throw of the White House? A self-governing state?]

Judge Randall R. Rader, U.S. Court of Appeals for the Federal Circuit, chief judge responsible for the (mis)conduct of his judges and Clerk of Court in Leader Techs v. Facebook, Inc., 678 F.3d 1300 (Fed. Cir. 2012). Judge Rader failed to manage his court resulting in a likely situation where his judges never even received briefs that they allegedly ruled on in favor of Facebook. Judge Rader also failed to disclose his conflicting relationships with a Leader principle with whom he may have had deep professional differences during his time at the Senate Judiciary Committee—his former professor of law at George Washington University Law Center, former Leader director Professor James P. Chandler. See analysis of Judge Rader's undisclosed conflicts of interest in Leader v. Facebook.
Judge Rader also did not stop his judges from creating new arguments and evidence for Facebook in the secrecy of chambers—after they had debunked all of Facebook's evidence on appeal, which is a clear breach of constitutional due process.

NOTICE: Opinion

This is an opinion blog. Any information contained or linked herein should be independently verified and should be considered the sole opinion of the writer. Free Speech and Freedom of the Press are protected by the First Amendment of the U.S. Constitution and other local, state, national and international laws. Therefore, as with all opinion, such opinion should not be relied upon without independent verification.

This site is a not-for-profit effort focused on education, news, investigation of issues in the public interest, and research, and relies on fair use copyright exemptions under 17 U.S.C. 106(a)-117 of the United States Copyright Act, in addition to any and all other related and relevant privileges to which a fair and reasonable person would attribute to this grassroots effort to root out corruption and promote justice. No rights whatsoever to third party content are claimed or implied.

AFI LOGO (with text)

AFI LOGO (no text)

CORRUPTION WATCH LIST

Faces of the Facebook Corruption (PDF) (currently being updated after the Fri. Mar. 7, 2014 Scribd censorship of this document:

Here is the cast of characters in Leader v. Facebook. We encourage you to report their corrupt activities to this site and others, like Lawless America. Feel free to communicate anonymously in any way in which you are most comfortable. The attempt of these people and their organizations to corrupt American justice and commerce cannot be tolerated. Vigilance. We will expose them. See Congressional Briefings (currently being updated after Scribd censored the documents on Fri. Mar. 7, 2014).

A. Facebook's law firms:

Fenwick & West LLP (Facebook securities and patent law firm; former Leader Technologies counsel; attempted an appearance in Leader v. Facebook; did not seek conflicts waiver from Leader prior to representing Facebook)

Federal Circuit Bar Association ("FCBA") (Federal Circuit's bar association; second largest in the U.S.; Facebook's law firms extert much influence in its policy and activity, incl. Fenwick & West LLP, Gibson Dunn LLP, Orrick Herrington LLP, Weil Gotschal LLP; Facebook's large shareholder, Microsoft, is a director; Federal Circuit Clerk of Court Jan Horbaly is an officer; FCBA made an appearance in Leader v. Facebook to oppose the amicus curiae (friend of the court) motion of Dr. Lakshmi Arunachalam, former Director of Network Architecture at Sun Microsystems, in favor of Leader Technologies and objecting to the evident conflicts of interest within the court itself, her motion was denied, the judges refused to disclose their conflicts which we now know include Facebook and Microsoft stocks)

DC Bar Association

Perkins Coie LLP (Facebook's "rapid response enforcement team;" law firm for Obama's chief counsels, the husband and wife team of Robert F. Bauer and Anita B. Dunn; Bauer was identified on Aug. 1, 2013 as having directed the IRS targeting of the Tea Party)

Stroz Friedberg (Facebook’s "forensic expert" who manipulated the data in Paul Ceglia v. Mark Zuckerberg, and who first revealed the existence of 28 Zuckerberg hard drives and Harvard emails that they told Leader Technologies in 2009 were "lost")

Chandler Law Firm Chartered (Professor James P. Chandler, III, principal; Leader Technologies patent counsel; adviser to IBM and David J. Kappos; adviser to Eric H. Holder, Jr. and the U.S. Department of Justice; author of the Economic Espionage Act of 1996 and the Federal Trade Secrets Act)

President Barack Obama (appointed Leonard P. Stark to the judge's seat in Delaware Federal District Court eight days after Stark's court allowed Facebook to get away with jury and court manipulation of an on-sale bar verdict which was attained without a single piece of hard evidence; Barack and Michelle Obama were evidently protecting their 47 million "likes" on Facebook)

James W. Breyer, Accel Partners LLP; Facebook director; client of Fenwick & West LLP since the 1990's; apparently received technology from other Fenwick clients that was shuffled to Zuckerberg, incl. Leader Technologies' inventions)

Thomas J. Kim (SEC, Chief Counsel & Assoc. Director) approved Facebook's 500-shareholder exemption on Oct. 14, 2007, one day after it was submitted by Fenwick & West LLP; Facebook used this exemption to sell $3 billion insider stock to the Russians Alisher Asmanov, Yuri Milner, DST, Digital Sky, Mail.ru which pumped Facebook's pre-IPO valuation to $100 billion; another Harvard grad, Kim worked at Latham & Watkins LLP which was the chief lobbyist for the National Venture Capital Association in 2002-2004 whose Chairman was . . . James W. Beyer, Accel Partners LLP; in other words Breyer and Kim, both Harvard grads, were associated at the time of the Zuckerberg hacking and theft of Leader Technologies' software code)

Tesla Motors (received $465 million in Obama stimulus funds and hired Cooley's Michael Rhodes in the seven months before the Leader v. Facebook trial, just before veteran Judge Joseph Farnan made the surprise announcement of his retirement, just six days after Facebook's disasterous Markman Hearing)

Solyndra (received $535 million in Obama stimulus at the recommendation of the Cooley-McBee Strategic "consulting" alliance)

BrightSource (received $1.6 billion in Obama stimulus at the recommendation of the Cooley-McBee Strategic "consulting" alliance)

John P. Breyer (father of James W. Breyer; founder of IDG Capital Partners - China; coached his son on exploiting Western markets while he quietly built a venture capital business in China for the last 20 years; the real brain behind the Breyer exploitations

IDG Capital Partners (China) (founded by John P. Breyer, the father of James W. Breyer, Accel Partners; the current launderer of the tens of billions James W has fleeced from the U.S. market from the bailout, stimulus and the "pump & dump" Facebook IPO schemes)

Goldman Sachs (received US bailout funds; then invested with DST in Facebook private stock via Moscow; took Facebook public; locked out American investors from investing)

U.S. Securities & Exchange Commission (granted Fenwick & West's application on behalf of Facebook for an unpredented exemption to the 500 shareholder rule; opened the floodgated for Goldman Sachs and Morgan Stanley to make a private market in Facebook pre-IPO insider stock; facilitated the influx of billions of dollars from "dubious" sources associated with Russian oligarchs, Alisher Asmanov and Yuri Milner, and the Kremlin; Goldman Sachs is a partner with this Moscow company, Digital Sky Technologies, aka DST, aka Mail.ru)

CGI Federal (US division of a Canadian company; Donated $47 million to Obama's reelection, then received the no-bid contract to build the ill-fated Obamacare website; Michelle Obama's Princeton classmate, Toni Townes-Whitely, is a Senior Vice President of CGI; the website is replete with social features and links to Facebook)

Kathleen Sebelius (Obama's Secretary of Health & Human Services since 2009 responsible for $678 million Obamacare implementation; made the decision to hire CGI Federal on a no-bid contract despite the evident conflict of interest with Michelle Obama and $47 million in Obama campaign donations by CGI; the website is replete with social features and links to Facebook)

Robin "Handsome Reward" Yangong Li (CEO, Baidu, Inc. (ADR); appointed Jan. 2004, the same month that Mark Zuckerberg obtained Leader Technologies' social networking source code to start Facebook; Robin Y. Li is very likely associated with John P. and James W. Breyer through their Chinese entities, including IDG Capital Partners, IDG-Accel and other variants; Li appointed a junior attorney from Fenwick & West LLP, Palo Alto/Mountain View, namely Parker Zhang, to be his "Head of Patents;" Fenwick & West LLP represented both Leader Technologies, Inc. and Accel Partners LLC in 2002-2003 and had Leader's source code in their files.)

Parker Zhang ("Head of Patents" at Baidu, Inc. (ADR), appointed in approx. May 2012; formerly a junior Associate attorney at Fenwick & West LLP; graduate from Michigan Law in 2005)

Rebecca M. Blank (Secretary, Department of Commerce; oversaw the dubious Leader v. Facebook activities of the Patent Office Director, David J. Kappos, who held over one million dollars in Facebook "dark pools" during the Leader v. Facebook proceedings; Kappos purchased this stock within weeks of his surprise recess appointment by President Obama; Kappos also was formerly employed by IBM, who sold Facebook 750 patents during the Leader v. Facebook proceedings; right before leaving the Patent OFfice, Kappos also ordered an unprecedented 3rd reexamination of Leader's patent without even identifying claims)

Mary L. Schapiro (Chairman, Securities & Exchange Commission; holds 51 Facebook "dark pools" stocks which held stock in Facebook, Baidu and more than a dozen Facebook crony companies; failed to regulate the "dark pools;" failed to disclose her substantial conflict of interest in regulating the run up to the Facebook IPO)

Robert C. Hancock (Chief Compliance Officer, Sands Capital Management, LLC; failed to file S.E.C. Form SC 12G notice of acquisition reports for Athenahealth, Baidu and Facebook during the period of the Facebook IPO in 2012; this conduct masked the conflicts of interest of Todd Y. Park, who was appointed by President Obama to be the U.S. Chief Technology Officer during this same period; Todd Y. Park is/has been founder, director and CEO of both Athenahealth and Castlight Health; Todd Y. Park deeply embedded the software from Athenahealth and Castlight Health into HealthCare.gov when he was CTO at Health & Human Services; none of these conflicts of interest were disclosed; Todd Y. Park's ethics pledges and reports are missing from the Office of Government Ethics)

Jonathan Goodman (Chief Counsel, Sands Capital Management, LLC; failed to file S.E.C. Form SC 12G notice of acquisition reports for Athenahealth, Baidu and Facebook during the period of the Facebook IPO in 2012; this conduct masked the conflicts of interest of Todd Y. Park, who was appointed by President Obama to be the U.S. Chief Technology Officer during this same period; Todd Y. Park is/has been founder, director and CEO of both Athenahealth and Castlight Health; Todd Y. Park deeply embedded the software from Athenahealth and Castlight Health into HealthCare.gov when he was CTO at Health & Human Services; none of these conflicts of interest were disclosed; Todd Y. Park's ethics pledges and reports are missing from the Office of Government Ethics; Goodman was formerly employed by Gibson Dunn LLP, Facebook appeals counsel in Leader v. Facebook)

Trip Adler ("Co-Founder" of Scribd; Harvard contemporaries of Mark Zuckerberg with a dubious orgins story, like Zuckerberg's; Scribd held AFI documents for two years, then summarily deleted the entire library without warning on Fri. Mar. 7, 2014; AFI's library contained only public documents and much evidence proving the Leader v. Facebook judicial corruption)

Jared Friedman ("Co-Founder" of Scribd; Harvard contemporaries of Mark Zuckerberg with a dubious orgins story, like Zuckerberg's; Scribd held AFI documents for two years, then summarily deleted the entire library without warning on Fri. Mar. 7, 2014; AFI's library contained only public documents and much evidence proving the Leader v. Facebook judicial corruption)

Jeffrey Wadsworth (CEO, Battelle Memorial Institute; President, Ohio State University Board of Trustees; former Deputy Director of Science & Technologies, Lawrence Livermore National Laboratory, University of California Board of Trustees)

Michael V. Drake (President, The Ohio State University; former Chancellor, University of California, Irvine)

Joseph A. Steinmetz (Provost, The Ohio State University; author of Psychological Science article on MOOC (Massive Open Online Course) that triggered the discovery of massive double-dealing and fraud within the Ohio State trustees)

Research Tip:Type any name or subject in the Google search at the top of this webpage. That will show you any relevant links within the sites that we have been following and investigating in the Leader v. Facebook case. Vigilance everyone! Our American Republic is at risk.

HOW TO FILE A FRAUD COMPLAINT AGAINST A UNIVERSITY

The following universities were announced as participants in Ohio State Provost Joseph A. Steinmetz's corrupt MOOC education initiative named "University Innovation Alliance" (UIA). We have identified the instructions and online forms you need to file a complaint with the participants. MOOC stands for "Massive Open Online Course."

You should complain about:

(1) the intellectual property theft of social networking source code from Leader Technologies, Columbus, Ohio that is the software engine running the UIA;

(2) the corruption at Ohio State University and OSU's collusion with Battelle Memorial Institute which helped steal the software being used by UIA; and

(3) the mistreatement of OSU Marching Band Director Jon Waters regarding fabricated Title IX charges that were used to pave the way for Steinmetz to announce UIA.

Universities pride themselves on protection of intellectual property.

Therefore, these universities cannot participate in this abuse of inventor copyrights, patents and trade secrets by The Ohio State Trustees and Administration. If these universities participate knowingly with Ohio State in its theft of intellectual property, then they are aiding and abetting the theft of intellectual property on a "massive" scale... Massive Open Online Course (MOOC) also known as The Eclipse Foundation.